Security has top priority on the Internet and is not just since the NSA affair a permanent topical issue. One way to safely navigate your Mac computer through the net is the free "Tor Browser Bundle", which makes you virtually invisible to the Internet and leaves no trace. For example, who wants to see unauthorized people follow their own activities on the Internet? This can not only be annoying in the private and business sector, but even dangerous; for example, when data such as bank details or passwords are intercepted and misused. With the "Tor" browser, you put a stop to all spying attempts. So that even beginners surf anonymous quickly and easily, the tool is integrated into a portable Firefox version. So you can get started directly without any training.
The protection program built into the "Tor Browser Bundle" uses the worldwide "Tor" network to route Internet traffic through randomly selected "Tor" servers. If you call up the COMPUTER PICTURE page via the browser, the current list of "Tor" nodes is called up and an encrypted connection is established to another subscriber. From this it goes to a second and then to a third node. Only at the end of this chain the COMPUTER BILD server is called. Because each node only knows where it gets the data from and where it sends it, seamless tracing is virtually impossible.
To increase the security while surfing, the "Tor Browser Package" regularly changes the individual stations of the connection. The three-node constraint represents a compromise between security and speed. In some circumstances, the connection speed may be lower than an "insecure" direct connection. The free protection mechanism in the "Tor Browser Package" thus ensures hardly any loss of speed.